JP5754255B2 - wireless communication device - Google Patents

wireless communication device Download PDF

Info

Publication number
JP5754255B2
JP5754255B2 JP2011132285A JP2011132285A JP5754255B2 JP 5754255 B2 JP5754255 B2 JP 5754255B2 JP 2011132285 A JP2011132285 A JP 2011132285A JP 2011132285 A JP2011132285 A JP 2011132285A JP 5754255 B2 JP5754255 B2 JP 5754255B2
Authority
JP
Japan
Prior art keywords
wireless
wireless network
device
state
printer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2011132285A
Other languages
Japanese (ja)
Other versions
JP2013005095A (en
Inventor
隆延 鈴木
隆延 鈴木
Original Assignee
ブラザー工業株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ブラザー工業株式会社 filed Critical ブラザー工業株式会社
Priority to JP2011132285A priority Critical patent/JP5754255B2/en
Publication of JP2013005095A publication Critical patent/JP2013005095A/en
Application granted granted Critical
Publication of JP5754255B2 publication Critical patent/JP5754255B2/en
Application status is Active legal-status Critical
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/08Configuration management of network or network elements
    • H04L41/0803Configuration setting of network or network elements
    • H04L41/0813Changing of configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/003Secure pairing of devices, e.g. bootstrapping a secure communication link between pairing terminals; Secure socializing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Description

  The technology disclosed in this specification is selected in any one of a plurality of states including a parent station state that functions as a parent station of a wireless network and a child station state that functions as a child station of a wireless network. TECHNICAL FIELD The present invention relates to a wireless communication device that can be operated in an automated manner.

  Patent Document 1 discloses a technique for constructing a wireless network including a client device and an access point. In this technique, when a predetermined operation is executed by a user, the client device generates a wireless profile (SSID, password, etc.) to be used for constructing the wireless network. The client device and the access point establish a wireless connection using the wireless profile. Thereby, the above wireless network is constructed.

JP 2004-234286 A

  Patent Document 1 does not disclose anything about a situation in which a new wireless network is constructed after the wireless network disappears. The present specification provides a technique for appropriately constructing a new wireless network in a situation where a new wireless network is constructed after the wireless network is extinguished.

  The wireless communication device disclosed in this specification is a state of any one of a plurality of states including a parent station state that functions as a parent station of a wireless network and a child station state that functions as a child station of the wireless network. This is a wireless communication device that can be selectively operated. The wireless control device includes a determination unit, a generation unit, and a communication execution unit. The determining unit determines in which state the wireless communication apparatus operates. When the first wireless network including the wireless communication device and the first external device is to be constructed, the generation unit determines that the wireless communication device is to operate in the master station state. First authentication information included in a first wireless profile for constructing a wireless network is generated. The communication execution unit constructs the first wireless network by executing communication for establishing a wireless connection with the first external device using the first wireless profile including the first authentication information. When the second wireless network including the wireless communication device and the second external device is to be constructed after the first wireless network disappears, it is determined that the wireless communication device operates in the master station state. In this case, the generation unit further includes second authentication information included in the second wireless profile for constructing the second wireless network, the second authentication information being different from the first authentication information. Generate. The communication execution unit further constructs a second wireless network by executing communication for establishing a wireless connection with the second external device using the second wireless profile including the second authentication information. To do.

  For example, when the first wireless network is constructed, there is a possibility that the first authentication information is illegally acquired by a third party. In the above technique, the wireless communication device is used when it is determined that the wireless communication device operates in the master station state when the second wireless network is to be constructed after the first wireless network is extinguished. Second authentication information different from the first authentication information for constructing the first wireless network is generated. That is, the wireless communication device generates second authentication information that cannot be known by a third party when the second wireless network is to be constructed. Therefore, it is possible to suppress a device owned by a third party from participating in the second wireless network illegally. That is, the security of the second wireless network can be improved. Therefore, a new wireless network can be appropriately constructed.

  Note that a control method, a computer program, and a computer-readable recording medium storing the computer program for realizing the wireless communication device are also novel and useful.

An example of a structure of a communication system is shown. 2 shows a flowchart of printer processing. The flowchart of a PIN / PBC connection process is shown. The flowchart of a manual connection process is shown. The flowchart of G / O processing is shown. A sequence diagram of case A is shown. FIG. 7 shows a sequence diagram continued from FIG. 6. A sequence diagram of case B is shown.

(Example)
(System configuration: Fig. 1)
As shown in FIG. 1, the communication system 2 includes a printer 10 (peripherals of PCs 60 and 70) and PCs 60 and 70. The printer 10 and the PC 60 can each execute a wireless communication function according to Wi-Fi Direct described later. Hereinafter, Wi-Fi Direct is referred to as “WFD”, and a wireless communication function according to WFD is referred to as “WFD function”. The printer 10 and the PC 60 can establish a wireless connection in accordance with WFD. A wireless network is established by establishing a wireless connection between the printer 10 and the PC 60. As a result, the printer 10 and the PC 60 can execute wireless communication of target data to be communicated such as print data. Hereinafter, devices capable of executing the WFD function, such as the printer 10 and the PC 60, are referred to as “WFD-compatible devices”.

  The PC 70 cannot execute the WFD function, but can execute a normal wireless communication function. That is, the PC 70 can establish a wireless connection with a known AP (access point). As will be described in detail later, a wireless network is established by establishing a wireless connection between the printer 10 in the G / O state functioning as an AP and the PC 70. As a result, the printer 10 and the PC 70 can execute wireless communication of target data to be communicated such as print data. Hereinafter, a device that cannot execute the WFD function, such as the PC 70, is referred to as a “WFD-incompatible device”.

(Configuration of Printer 10)
The printer 10 includes a display unit 12, an operation unit 14, a wireless interface 16, a print execution unit 20, and a control unit 22. Each of the above-described units 12 to 22 is connected to a bus line (reference numeral omitted). The display unit 12 is a display for displaying various information. The operation unit 14 includes a plurality of keys. The user can give various instructions to the printer 10 by operating the operation unit 14. The wireless interface 16 is an interface for executing wireless communication. The wireless interface 16 includes a wireless chip set 17. The function of the wireless chip set 17 will be described later. The print execution unit 20 includes a printing mechanism such as an ink jet method or a laser method, and executes printing in accordance with an instruction from the control unit 22.

  The control unit 22 includes a CPU 30 and a memory 32. The CPU 30 executes various processes according to the program 34 stored in the memory 32. The memory 32 includes a ROM, a RAM, a hard disk, and the like. The memory 32 stores a management list 36 described later in addition to the program 34 described above. When the CPU 30 executes processing according to the program 34, the functions of the determination unit 40, the generation unit 42, the communication execution unit 44, the stop unit 46, and the display control unit 48 are realized.

(Configuration of PC 60, 70)
The PC 60 includes a CPU, a memory, a display, etc. (not shown). The memory of the PC 60 stores a printer driver program for the printer 10. The CPU of the PC 60 can generate print data to be printed using a printer driver program. In a state where a wireless connection is established between the printer 10 and the PC 60, the PC 60 can transmit print data to the printer 10 wirelessly. The PC 70 has the same configuration as the PC 60 except that the WFD function cannot be executed.

(WFD)
As described above, the printer 10 and the PC 60 can each execute the WFD function. WFD is a standard established by the Wi-Fi Alliance. WFD is described in “Wi-Fi Peer-to-Peer (P2P) Technical Specification Version 1.1” created by Wi-Fi Alliance.

  In WFD, three states are defined as device states: a Group Owner state (hereinafter referred to as “G / O state”), a client state, and a device state. A WFD compatible device (that is, the printer 10, the PC 60, etc.) can selectively operate in one of the above three states. Note that a WFD non-compliant device cannot selectively operate in one of the three states described above, and always operates in a client state.

  One wireless network is configured by the G / O state device and the client state device. In one wireless network, there can be only one device in the G / O state, but there can be one or more devices in the client state. A device in the G / O state manages one or more devices in the client state. Specifically, the G / O state device stores a management list (see 36 in FIG. 1) in which identification information (that is, MAC address) of each of one or more client state devices is described. When a device in client state (including both WFD compatible devices and non-WFD compatible devices) newly joins the wireless network, the G / O state device adds the identification information of the device to the management list, When the device leaves the wireless network, the device identification information is deleted from the management list.

  A device in the G / O state communicates with a device registered in the management list, that is, a device in a client state (for example, data including information on the network layer of the OSI reference model (print data). Etc.)) is possible. However, a device in the G / O state has data for participating in a wireless network with a device that is not registered in the management list (for example, data not including network layer information (Probe Request signal, Probe Response signal). However, it is impossible to perform wireless communication of the target data. For example, the printer 10 in the G / O state can wirelessly receive print data from the PC 60 registered in the management list 36 (that is, the client state PC 60), but prints from a PC not registered in the management list 36. Data cannot be received wirelessly.

  In addition, a G / O state device can relay wireless communication of target data (print data, etc.) between a plurality of client state devices. For example, when the PC 60 in the client state should wirelessly transmit print data to another printer in the client state, the PC 60 first wirelessly transmits the print data to the printer 10 in the G / O state. The print data is wirelessly transmitted to the other printer. That is, a device in the G / O state can execute a function of an AP (access point) of the wireless network.

  A WFD compatible device that does not participate in the wireless network (that is, a WFD compatible device that is not registered in the management list) is a device in a device state. The device in the device state can execute wireless communication of data for participating in the wireless network, but cannot execute wireless communication of target data (print data or the like) via the wireless network.

(Method for performing wireless connection)
In the present embodiment, WPS (Wi-Fi Protected Setup) wireless connection method and manual wireless connection method (hereinafter referred to as “manual method”) as a method for performing wireless connection between a pair of devices. And are used. In WFD, a WPS wireless connection method is used. The WPS wireless connection system includes a PIN (Personal Identification Number) code system and a PBC (Push Button Configuration) system. On the other hand, the manual method does not use the WPS wireless connection method between the WFD non-compliant device (for example, PC 70) and the AP (for example, the printer 10 in the G / O state), so that the user establishes a wireless connection. This is a method for executing wireless connection by inputting necessary wireless profiles (SSID, authentication method, encryption method, password, etc.).

(Autonomous G / O mode)
The WFD compatible device (printer 10, PC 60, etc.) of this embodiment operates in accordance with one of the normal operation mode and the autonomous G / O mode different from the normal operation mode. The user can execute a predetermined operation for switching ON / OFF of the autonomous G / O mode in the operation unit of the WFD-compatible device (see S10 in FIG. 2 described later).

(Printer processing: Fig. 2)
Next, the contents of the printer process executed by the printer 10 in the device state will be described with reference to FIG.

  While the power supply of the printer 10 is in the ON state, in S10, the control unit 22 of the printer 10 monitors whether the autonomous G / O mode ON operation is performed. If YES in S10 (when the user performs an ON operation in the autonomous G / O mode), the process proceeds to S20. In S20, the determination unit 40 (see FIG. 1) determines the G / O state as the state of the printer 10, and shifts the state of the printer 10 from the current state (for example, the device state) to the G / O state. If NO in S10 (when the user does not execute the ON operation in the autonomous G / O mode), the process proceeds to S12.

  Next, in S22, the generation unit 42 (see FIG. 1) generates a password. The password generated in S22 is a password that should be included in the wireless profile used to construct the wireless network. Specifically, the generation unit 42 randomly generates a character string using alphanumeric characters, and generates the password by converting the generated character string with a predetermined function related to the current time. When a password is generated by the above method, regularity hardly appears in the password. That is, each time the generation unit 42 generates a password, a password different from the previously generated password is generated. When S22 ends, the process proceeds to S12.

  In S12, the control unit 22 determines whether or not the current state of the printer 10 is the G / O state. If YES in S12 (if the current state of the printer 10 = G / O state), the process proceeds to S24. In S24, the control unit 22 executes G / O processing (see FIG. 5). When the G / O process of S24 is completed, the process returns to S10.

  If NO in S12 (if the current state of the printer 10 = device state or client state), the process proceeds to S14. In S14, the control unit 22 monitors that the method selection operation is executed. The user can operate the operation unit 14 of the printer 10 to execute a method selection operation for selecting any one of the PIN code method, the PBC method, and the manual method. When the user performs the method selection operation, the control unit 22 determines YES in S14 and proceeds to S16. If NO in S14 (when the user does not execute the method selection operation), the process returns to S10.

  In S16, the control unit 22 determines whether or not the method selected in S14 is the PIN code method or the PBC method. If YES in S16 (the method selected in S14 = PIN code method or PBC method), the process proceeds to S18. In S18, the control unit 22 executes a PIN / PBC connection process (see FIG. 3). On the other hand, if NO in S16 (the method selected in S14 = manual method), the process proceeds to S26. In S26, the determination unit 40 determines the G / O state as the state of the printer 10, and shifts the state of the printer 10 from the current state (for example, device state) to the G / O state. Next, in S28, the control unit 22 executes a manual connection process (see FIG. 4). When S18 or S28 ends, the process returns to S10.

  If the determination is YES in S16 while the current state of the printer 10 is the device state (the method selected in S14 = PIN code method or PBC method), the determination unit 40 determines that the printer 10 The device state is maintained as the state, and the process proceeds to S18. On the other hand, when it is determined YES in S16 while the current state of the printer 10 is the client state (the method selected in S14 = PIN code method or PBC method), the determination unit 40 determines that the printer 10 After the device state is determined as the state of the printer 10 and the state of the printer 10 is shifted from the client state to the device state, the process proceeds to S18.

(PIN / PBC connection processing: Fig. 3)
Next, the contents of the PIN / PBC connection process executed by the printer 10 in the device state will be described with reference to FIG. The PIN / PBC connection process is a process for establishing a wireless connection between the printer 10 and another WFD compatible device (for example, the PC 60) by any one of the PIN code method and the PBC method.

  In S30 of FIG. 3, the control unit 22 of the printer 10 executes a Scan process. The Scan process is a process for searching for a G / O state device (a WFD compatible device) existing around the printer 10. Specifically, in the scan process, the control unit 22 sequentially transmits a probe request signal wirelessly using 13 channels of 1ch to 13ch sequentially.

  For example, when there is a WFD compatible device (hereinafter referred to as “specific G / O device”) in the G / O state around the printer 10, the specific G / O device is one of channels 1 to 13. The use of one channel is determined in advance. Therefore, the specific G / O device receives the Probe Request signal from the printer 10 wirelessly. In this case, the specific G / O device transmits a Probe Response signal to the printer 10 wirelessly. The Probe Response signal includes information indicating that the specific G / O device is in the G / O state. As a result, the control unit 22 can find a specific G / O device. The Probe Response signal further includes the device name of the specific G / O device, information indicating the category of the specific G / O device (for example, printer, PC, etc.), and the specific G / O device. MAC address. As a result, the control unit 22 can acquire information regarding a specific G / O device.

  For example, when there is a WFD compatible device in a device state (hereinafter referred to as “specific device device”) around the printer 10, the specific device device is one of 1ch, 6ch, and 11ch. It is determined in advance that the channels will be used. Therefore, the specific device device also receives the Probe Request signal from the printer 10 wirelessly. In this case, the specific device device transmits a Probe Response signal to the printer 10 wirelessly. However, this Probe Response signal includes information indicating that the device is in the device state, and does not include information indicating that the device is in the G / O state. In addition, even if a device in a client state (including a device that does not support WFD) receives a Probe Request signal from the printer 10 wirelessly, it does not transmit a Probe Response signal to the printer 10 wirelessly. Therefore, the control unit 22 can appropriately find a specific G / O device in the Scan process.

  Next, in S32, the control unit 22 executes a Listen process. The Listen process is a process for responding to a Probe Request signal received wirelessly from a specific device device executing a Search process (see S34) described later. That is, when receiving a Probe Request signal from a specific device device wirelessly, the control unit 22 wirelessly transmits a Probe Response signal. The Probe Response signal includes information indicating that the printer 10 is in a device state, a device name of the printer 10, information indicating a category of the printer 10, and a MAC address of the printer 10. The specific device device can find the printer 10 by the control unit 22 transmitting the Probe Response signal.

  Next, in S34, the control unit 22 sequentially transmits a probe request signal wirelessly using the three channels of 1ch, 6ch, and 11ch sequentially. As a result, the control unit 22 wirelessly receives a Probe Response signal from a specific device device. The Probe Response signal includes information indicating that a specific device device is in a device state, a device name of the specific device device, information indicating a category of the specific device device, a MAC address of the specific device device, including. As a result, the control unit 22 can find a specific device device and can acquire information regarding the specific device device. Note that a specific G / O device can also wirelessly transmit a Probe Response signal to the printer 10 in response to a Probe Request signal transmitted in the search process of the printer 10. However, this Probe Response signal includes information indicating the G / O state and does not include information indicating the device state. Further, as described above, devices in a client state (including devices not supporting WFD) do not transmit a probe response signal to the printer 10 wirelessly even if they receive the probe request signal from the printer 10 wirelessly. For this reason, the control part 22 can find a specific device apparatus appropriately in Search processing.

  Next, in S36, the control unit 22 causes the display unit 12 to display the device list. The control unit 22 causes the display unit 12 to display information on each device found in S30 and S34 (that is, information obtained in S30 and S34). In the example of FIG. 3, in S36, information (G / O status, printer, MAC address) related to the device corresponding to the device name “XXX” and information related to the device corresponding to the device name “YYY” (device status, PC, MAC address) is displayed on the display unit 12.

The user can know the devices existing around the printer 10 by looking at the device list displayed in S36. The user can perform a device selection operation on the operation unit 14 for selecting which device to establish a wireless connection with the printer 10.
Hereinafter, a device (for example, the PC 60) selected by the device selection operation is referred to as a “target device”. When the target device is selected, the process proceeds to S38.

  In S38, the control unit 22 determines whether the target device is in a device state. When the target device is in the device state (for example, when the device corresponding to the device name “YYY” in FIG. 3 is selected by the user), the control unit 22 determines YES in S38 and proceeds to S40.

  In S40, the determination unit 40 (see FIG. 1) executes G / O negotiation with the target device. As described above, only one device in the G / O state can exist in one wireless network. Therefore, the determination unit 40 executes G / O negotiation, determines one of the printer 10 and the target device as G / O, and determines the other device as a client.

  For example, when the method selected in S14 of FIG. 2 is the PIN code method, in S40, the determination unit 40 generates a PIN code and displays it on the display unit 12. In this case, the user inputs the PIN code displayed on the display unit 12 to the target device. Although an example in which the PIN code is displayed on the printer 10 and the PIN code is input to the target device has been described here, the PIN code may be displayed on the target device and the PIN code may be input to the printer 10. When the PIN code is displayed and input, the determination unit 40 wirelessly transmits a connection request signal to the target device and wirelessly receives an OK signal from the target device.

  On the other hand, for example, when the method selected in S14 of FIG. 2 is the PBC method, the PIN code is not displayed and input. In this case, the determination unit 40 wirelessly transmits a connection request signal to the target device and receives an OK signal from the target device wirelessly.

  When the transmission of the connection request signal and the reception of the OK signal are completed, the determination unit 40 wirelessly transmits information indicating the G / O priority of the printer 10 to the target device and indicates the G / O priority of the target device. Receive information wirelessly from the target device. The G / O priority of the printer 10 is an index indicating the degree to which the printer 10 should become G / O, and is determined in advance in the printer 10. Similarly, the G / O priority of the target device is an index indicating the degree to which the target device should become G / O. For example, a device (for example, a PC) having relatively high CPU and memory capabilities can perform other processing at high speed while operating as a G / O. Therefore, the G / O priority is normally set to such a device so that the degree to be G / O is high. On the other hand, for example, a device having relatively low CPU and memory capabilities may not be able to execute other processes at high speed while operating as a G / O. Therefore, the G / O priority is normally set to such a device so that the degree to be G / O is low.

  The determination unit 40 compares the G / O priority of the printer 10 with the G / O priority of the target device, determines a device (printer 10 or target device) with a higher priority as G / O, The device with the lower priority (target device or printer 10) is determined as a client. Further, the target device uses the same method as the printer 10 to determine the G / O and the client based on the G / O priority of the printer 10 and the G / O priority of the target device.

  When the G / O negotiation in S40 ends, the determination unit 40 shifts the state of the printer 10 from the device state to the determined state (that is, the client state or the G / O state). The target device also shifts from the device state to the determined state (that is, the client state or the G / O state).

  On the other hand, when the target device is in the G / O state in S38 (for example, when a device corresponding to the device name “XXX” in FIG. 3 is selected by the user), the control unit 22 determines NO in S38, Skip S40 and proceed to S42. In this case, the determination unit 40 determines the client state as the state of the printer 10 without causing the G / O negotiation in S40 to be executed, and shifts the state of the printer 10 from the device state to the client state. This is because since the target device is in the G / O state, the printer 10 is preferably in a client state managed by the target device.

  For example, if the method selected in S14 of FIG. 2 is the PIN code method, if NO is determined in S38, the PIN code is displayed and input as in S40. Next, the determination unit 40 wirelessly receives a connection request signal from the target device and transmits an OK signal to the target device wirelessly. On the other hand, for example, when the method selected in S14 of FIG. 2 is the PBC method, if NO is determined in S38, the PIN code is not displayed and input, and the determination unit 40 The connection request signal is received wirelessly from the mobile phone, and the OK signal is transmitted wirelessly to the target device. When the connection request signal is received and the OK signal is transmitted, the process proceeds to S42.

  In S42, the control unit 22 determines whether or not the current state of the printer 10 is the G / O state. If YES in S42 (current state of printer 10 = G / O state and current state of target device = client state), the process proceeds to S44. On the other hand, if NO in S42 (current state of printer 10 = client state and current state of target device = G / O state), the process proceeds to S52.

  In S44, the generation unit 42 (see FIG. 1) generates a password. The process of S44 is the same as the process of S22 of FIG. When S44 ends, the process proceeds to S46.

  In S46, the communication execution unit 44 (see FIG. 1) executes WPS negotiation for the G / O state. For example, when the method selected in S14 of FIG. 2 is the PIN code method, the communication execution unit 44 uses the PIN code displayed on the printer 10 or the PIN code input to the printer 10 to specify a specific code. Data (for example, packet data finally communicated between the printer 10 and the target device) is converted into a hash code. On the other hand, the target device also converts the specific data into a hash code using the PIN code displayed on the target device or the PIN code input to the target device. Either the printer 10 (communication execution unit 44) or the target device determines whether or not the hash code generated by the printer 10 matches the hash code generated by the target device. Also, for example, when the method selected in S14 of FIG. 2 is the PBC method, the printer 10 (communication execution unit 44) and the target device use the predetermined PIN code to specify the specific data. Is converted to a hash code. Also, either the printer 10 or the target device determines whether the two hash codes match. In this embodiment, the SSID, the authentication method, and the encryption method are determined in advance. However, the SSID may be generated in S46. The password is generated in S44.

  When the two hash codes match, that is, when the PIN code is successfully authenticated, the communication execution unit 44 wirelessly transmits the wireless profile to the target device. As a result, the printer 10 and the target device can use the same wireless profile.

  Next, in S48, the communication execution unit 44 executes connection processing with the target device using the wireless profile. That is, the communication execution unit 44 performs wireless communication of authentication request, authentication response, association request, association response, and 4-way handshake with the target device using the wireless profile. In this process, the printer 10 and the target device execute various authentication processes such as SSID authentication, password authentication, authentication method, and encryption method authentication. When all the authentications are successful, a wireless connection is established between the printer 10 and the target device. Thereby, a wireless network including the printer 10 and the target device is constructed.

  Next, in S50, the control unit 22 registers the MAC address of the target device in the client state in the management list 36 in the memory 32. Note that the MAC address of the target device is included in the Probe Response signal acquired in the search process of S34. When S50 ends, the PIN / PBC connection process ends.

  On the other hand, in S52, the communication execution unit 44 executes WPS negotiation for the client state. Specifically, in S52, the communication execution unit 44 wirelessly receives a wireless profile (SSID, authentication method, encryption method, password, etc.) necessary for establishing a wireless connection from the target device. For example, if the method selected in S14 of FIG. 2 is the PIN code method, the printer 10 (communication execution unit 44) and the target device may use the PIN code displayed on the printer 10 or the PIN input to the printer 10. Using the code, the specific data is converted into a hash code, and it is determined whether or not the two hash codes match. When the two hash codes match, the communication execution unit 44 wirelessly receives the wireless profile from the target device. For example, when the method selected in S14 of FIG. 2 is the PBC method, the printer 10 and the target device convert specific data into a hash code by using a predetermined PIN code, It is determined whether or not the hash codes match. When the two hash codes match, the communication execution unit 44 wirelessly receives the wireless profile from the target device. As a result, the printer 10 and the target device can use the same wireless profile.

  Next, in S54, the communication execution unit 44 executes a connection process with the target device using the wireless profile, similarly to S48 described above. As a result, a wireless connection is established between the printer 10 and the target device. Thereby, a wireless network including the printer 10 and the target device is constructed. When S54 ends, the PIN / PBC connection process ends.

  For example, when the printer 10 is in the G / O state, the printer 10 can execute communication of target data (print data, etc.) to be communicated with the target device in the client state. . Note that the target data includes data in the network layer that is higher than the physical layer of the OSI reference model. Therefore, the printer 10 in the G / O state can execute network layer wireless communication with the target device in the client state. Further, the printer 10 in the G / O state can relay wireless communication between the target device in the client state and other devices in the client state registered in the management list.

(Manual connection processing: Fig. 4)
Next, the contents of the manual connection process (S28 in FIG. 2) executed by the printer 10 in the G / O state will be described with reference to FIG. When the user desires to establish a wireless connection between the printer 10 and another device (hereinafter referred to as “target device”) without using the WPS wireless connection method, FIG. In S14, the manual method is selected. As a result, manual connection processing is executed. As described above, when the manual connection process is started, the printer 10 is in the G / O state (S26 in FIG. 2). This is because the manual connection process normally assumes that the device is connected to a non-WFD compatible device that cannot enter the G / O state.

  In S60, first, the generation unit 42 generates a password. The process of S60 is the same as the process of S22 of FIG. When S60 ends, the process proceeds to S62.

  In S62, the display control unit 48 (see FIG. 1) causes the display unit 12 to display the SSID and password. Specifically, in S62, the display control unit 48 causes the display unit 12 to display a predetermined SSID and the password generated in S60. The SSID and the password are information that should be included in a wireless profile necessary for establishing a wireless connection. The user can know the SSID and password by looking at the display unit 12. In the manual method, the SSID and password are not transmitted wirelessly to the target device.

  The user operates the operation unit of the target device to input the SSID and password displayed on the display unit 12 of the printer 10 to the target device. In this case, the target device wirelessly transmits the input SSID and password to the printer 10. At this time, the target device wirelessly transmits the MAC address of the target device to the printer 10 together with the input SSID and password.

  In S64, the communication execution unit 44 determines whether the authentication of the SSID and password received from the target device has been successful. Specifically, in S64, the communication execution unit 44 determines (authenticates) whether or not the SSID and password received from the target device match the SSID and password displayed on the display unit 12. If YES in S64 (if the SSID and password received from the target device match the SSID and password displayed on the display unit 12), the process proceeds to S66. If NO in S64, S66 and S68 are not executed, and the manual connection process ends.

  In S66, the communication execution unit 44 executes connection processing with the target device using a wireless profile. Specifically, first, in S66, the communication execution unit 44 wirelessly transmits a predetermined authentication method, encryption method, and the like to the target device. As a result, the printer 10 and the target device can use a common wireless profile (SSID, authentication method, encryption method, password, etc.). Furthermore, the communication execution unit 44 executes communication (Authentication Request, Authentication Response, Association Request, Association Response, and 4-way handshake) using a wireless profile with the target device, and an authentication method and an encryption method. Various authentication processes other than SSID and password authentication are executed. When all the authentications are successful, a wireless connection is established between the printer 10 and the target device. Thereby, a wireless network including the printer 10 and the target device is constructed.

  Next, in S <b> 68, the control unit 22 registers the MAC address of the target device that is a client in the management list 36 in the memory 32. When S68 ends, the manual connection process ends.

  As described above, in the manual method (see FIG. 4), the user needs to input the SSID and password to the target device. Therefore, the manual method can be called “manual wireless setting mode”. On the other hand, in the PIN code method and the PBC method (see FIG. 3), the user does not have to input the SSID and password to the target device. Accordingly, the PIN code method and the PBC method can be collectively referred to as “automatic wireless setting mode (or simple wireless setting mode)”.

(G / O processing: FIG. 5)
Next, contents of processing executed when the printer 10 operates as G / O of the wireless network will be described with reference to FIG. In S <b> 70, the control unit 22 monitors whether a method selection operation is performed on the operation unit 14 by the user. When the method selection operation is executed (YES in S70), the process proceeds to S72. Note that the user also performs a method selection operation on a device (hereinafter referred to as “target device”) that should establish a wireless connection with the printer 10 in the G / O state.

  In S72, the control unit 22 determines whether or not the method selected in S70 is the PIN code method or the PBC method. In the case of YES in S72 (when the method selected in S70 = PIN code method or PBC method), the control unit 22 proceeds to S74. At this time, the target device can find the printer 10 in the Scan process, and displays a device list including the printer 10 on the display unit of the target device.

  For example, when the method selected in S70 is the PIN code method, when the user selects the printer 10 from the device list, the PIN code is displayed between the target device and the printer 10 as in S40 of FIG. After that, the connection request signal is received and the OK signal is transmitted. On the other hand, for example, if the method selected in S70 is the PBC method, the PIN code is not displayed and input, and the connection request signal and the OK signal are transmitted between the target device and the printer 10. Executed. Note that the connection request signal received from the target device includes various information such as the MAC address and category of the target device. Thereby, the control part 22 acquires the various information of an object apparatus. When the target device transmits a connection request signal to the printer 10, the target device shifts to the client state. This is because the target device cannot be in the G / O state because the printer 10 is in the G / O state. When the target device shifts to the client state, the process proceeds to S74.

  In S74, the control unit 22 executes WPS negotiation for the G / O state, similarly to S46 of FIG. That is, each process of S74-S78 is the same as S46-50 of FIG. When S78 ends, the process returns to S70.

  On the other hand, if NO in S72 (if the method selected in S70 = manual method), the process proceeds to S80. In S80, the display control unit 48 causes the display unit 12 to display the SSID and password. The password displayed on the display unit 12 in S80 is a password generated when the printer 10 is shifted to the G / O state (S22 in FIG. 2, S44 in FIG. 3, and S60 in FIG. 4). S82 is the same as S64 of FIG. If YES in S82 (if the SSID and password received from the target device match the SSID and password displayed on the display unit 12), the process proceeds to S76. If NO in S82, the process returns to S70.

  On the other hand, in the case of NO in S70 (when the method selection operation is not executed), in S84, the control unit 22 monitors the acquisition of an undetectable signal from the wireless chipset 17 (see FIG. 1). A device in the client state (hereinafter referred to as “client device”) registered in the management list 36 periodically transmits a signal (hereinafter referred to as “periodic signal”) to the printer 10 in the G / O state. The wireless chip set 17 receives a periodic signal transmitted from the client device. For example, when the client device is a mobile terminal, the client device may move out of a range where wireless communication with the printer 10 is possible. Further, for example, there is a possibility that wireless communication cannot be performed between the printer 10 and the client device due to a communication failure or the like. Further, for example, there is a possibility that the power of the client device is turned off. In such a case, the wireless chip set 17 cannot receive a periodic signal transmitted from the client device. The wireless chip set 17 supplies an undetectable signal to the control unit 22 when a state in which the periodic signal cannot be received from the client device continues for a predetermined time. The undetectable signal includes the MAC address of the client device in the undetectable state. When the control unit 22 acquires the detection impossible signal (YES in S84), the control unit 22 proceeds to S88.

  On the other hand, in the case of NO in S84 (when the detection failure signal is not acquired from the wireless chipset 17), in S86, the control unit 22 monitors the acquisition of the non-connection signal from the client device. For example, when the user desires to disconnect the client device from the wireless network, the user can perform a predetermined operation on the client device. In this case, the client device wirelessly transmits a non-connection signal indicating that the client device is leaving the wireless network to the printer 10 in the G / O state. The unconnected signal includes the MAC address of the client device that is the source of the unconnected signal. When acquiring the non-connection signal (YES in S86), the control unit 22 proceeds to S88. If NO in S86, the process returns to S70.

  In S88, the control unit 22 deletes the MAC address included in the undetectable signal acquired in S84 or the MAC address included in the non-connection signal acquired in S86 from the management list 36. As a result of the processing in S88, the client device leaves the wireless network, and the client device is removed from the management target of the control unit 22. When S88 ends, the process proceeds to S90.

  In S90, the control unit 22 determines whether or not the number of client devices is zero. Specifically, the control unit 22 determines whether or not the number of MAC addresses stored in the management list 36 is zero. If NO in S90 (if the number of MAC addresses stored in the management list 36 is 1 or more), the G / O process returns to S70. On the other hand, if YES in S90 (if the number of MAC addresses stored in the management list is zero), the process proceeds to S92.

  In S92, the stop unit 46 (see FIG. 1) shifts the state of the printer 10 from the G / O state to the device state, and stops the operation as G / O. When the operation as G / O is stopped, the printer 10 cannot wirelessly communicate target data (print data or the like) with other devices. In addition, the printer 10 cannot relay wireless communication of target data among a plurality of client devices. In S92, the stopping unit 46 discards the wireless profile used in the wireless network. That is, the stopping unit 46 discards the passwords (S22 in FIG. 2, S44 in FIG. 3, and S60 in FIG. 4) generated when the printer 10 is shifted to the G / O state. That is, in S92, the wireless network disappears. When S92 ends, the G / O process ends.

(Case A: FIGS. 6 and 7)
Next, an example (case A) in which each of the above processes (see FIGS. 2 to 5) is executed will be described with reference to FIGS.

(Processing A1)
In Case A, first, the user operates the operation unit 14 of the printer 10 in the device state to execute a method selection operation for selecting a manual method (NO in S16 of FIG. 2). Further, the user executes a method selection operation for selecting the manual method even on the PC 70 in the device state. In this case, first, the printer 10 shifts the state of the printer 10 from the device state to the G / O state (S26 in FIG. 2). Next, the printer 10 generates a password “xxxxxxxx” (S60 in FIG. 4). Next, the printer 10 displays the predetermined SSID “aaaaaa” and the generated password “xxxxxxxx” on the display unit 12 (S62 in FIG. 4). The user inputs the SSID and password displayed on the display unit 12 of the printer 10 to the PC 70. The PC 70 wirelessly transmits the input SSID and password to the printer 10. When the authentication of the SSID and password received from the PC 70 is successful (YES in S64 of FIG. 4), the printer 10 performs other authentication such as authentication of the authentication method and encryption method. If all the authentications are successful, a wireless connection is established between the printer 10 and the PC 70 (S66 in FIG. 4). Thereby, a wireless network including the printer 10 and the PC 70 is constructed.

(Process A2)
Next, the user executes a method selection process for selecting the PIN code method for each of the printer 10 in the G / O state and the PC 60 in the device state (YES in S70 of FIG. 5, YES in S72). In this case, the PC 60 can find the printer 10 in the Scan process, and displays a device list including the printer 10 on the display unit of the PC 60. When the user selects the printer 10 from the device list, the PC 60 and the printer 10 display and input a PIN code. Thereafter, the PC 60 shifts to the client state. Next, WPS negotiation is executed between the printer 10 and the PC 60 (S74 in FIG. 5), and the wireless profile is transmitted from the printer 10 to the PC 60. This wireless profile includes the SSID “aaaaaa” and the generated password “xxxxxxxx”. Next, the printer 10 executes connection processing with the PC 60 using the wireless profile (S76 in FIG. 5). As a result, a wireless connection is established between the printer 10 and the PC 60 (S76 and S78 in FIG. 5). As a result, the PC 60 can newly join an existing wireless network including the printer 10 and the PC 70.

(Process A3)
Thereafter, the PC 60 and the PC 70 leave the wireless network. The PC 60 shifts the state from the client state to the device state. As a result, the number of client devices to be managed by the printer 10 (that is, the number of clients) becomes zero (YES in S90 of FIG. 5). In this case, the printer 10 shifts (returns) the state of the printer 10 from the G / O state to the device state, and stops the operation as the G / O (S92 in FIG. 5). At this time, the printer 10 discards the wireless profile used in the wireless network. As a result, the wireless network disappears. According to this configuration, the printer 10 can appropriately extinguish the wireless network.

(Process A4)
As shown in FIG. 7, after that, the user again executes a method selection operation for selecting the manual method for each of the device-state printer 10 and the device-state PC 70 (NO in S16 of FIG. 2). In this case, as in the process A1, first, the printer 10 shifts the state of the printer 10 from the device state to the G / O state (S26 in FIG. 2). Next, the printer 10 generates the password “xxxxxxxx” generated last time. A password “yyyyyy” different from the password is randomly generated (S60 in FIG. 4). Therefore, even if “xxxxxxxx” is illegally acquired by a third party, it is difficult for the third party to guess “yyyyy” based on “xxxxxxxx”. For this reason, the security of the wireless network can be improved. Next, the printer 10 displays a predetermined SSID “aaaaaa” and the generated password “yyyyyy” on the display unit 12 (S62 in FIG. 4). Thereafter, a process similar to the above-described process A1 is executed between the printer 10 and the PC 70. As a result, the wireless connection is established again between the printer 10 and the PC 70 (S66 in FIG. 4). Thereby, a new wireless network including the printer 10 and the PC 70 is constructed.

(Process A5)
Next, the user executes a method selection process for selecting the PIN code method for each of the printer 10 in the G / O state and the PC 60 in the device state (YES in S70 of FIG. 5, YES in S72). Also in this case, the same process as the process A2 described above is executed between the printer 10 and the PC 60. However, as illustrated in FIG. 7, in the process A5, the wireless profile transmitted from the printer 10 to the PC 60 in the WPS negotiation includes the password “yyyyyy” instead of the password “xxxxxxxx”. This point is different from the above-described process A2. As a result of the processing A5, a wireless connection is established between the printer 10 and the PC 60 (S76 and S78 in FIG. 5). As a result, the PC 60 can newly join an existing wireless network including the printer 10 and the PC 70.

  For example, in case A, when a wireless network is constructed in process A1 of FIG. 6, the password “xxxxxxxx” displayed on the display unit 12 may be stolen by a third party. In the present embodiment, the printer 10 has a different password “yyyyyy” when the wireless network is to be constructed in the process A4 in FIG. 7 after the wireless network constructed in the process A1 in FIG. Is generated. That is, when a new wireless network is to be constructed, the printer 10 generates a new password that cannot be known by a third party. Therefore, it is possible to prevent a device owned by a third party from participating in a new wireless network illegally. That is, the security of a new wireless network can be improved, and as a result, a new wireless network can be appropriately constructed.

(Case B: Fig. 8)
Subsequently, another example (case B) in which each of the above processes (see FIGS. 2 to 5) is executed will be described with reference to FIG. In FIG. 8, it is assumed that a wireless connection is established between the printer 10 and the PC 60 by the PIN code method.

  In Case B, first, the user performs a method selection operation for selecting the PIN code method for each of the printer 10 in the device state and the PC 60 in the device state (YES in S16 of FIG. 2). In this case, first, the printer 10 executes each process of Scan, Listen, and Search (S30 to S34 in FIG. 3). At this time, the printer 10 can find the device state PC 60 in the Search process. Next, the printer 10 causes the display unit 12 to display a device list including the PC 60 (S36 in FIG. 3). The user can execute a device selection operation for selecting the PC 60 by operating the operation unit 14 of the printer 10. When the device selection operation is executed, the PIN code is displayed and input between the printer 10 and the PC 60.

  Next, the printer 10 performs G / O negotiation with the PC 60 (S40 in FIG. 3). For example, if the printer 10 is determined as G / O and the PC 60 is determined as a client as a result of the above G / O negotiation (YES in S42 in FIG. 3), the printer 10 changes the status of the printer 10 to G. Transition to the / O state. On the other hand, the PC 60 shifts the state of the PC 60 to the client state. Next, the printer 10 generates a password “pppppp” (S44 in FIG. 3). Next, WPS negotiation is executed between the printer 10 and the PC 60 (S46 in FIG. 3), and the wireless profile is transmitted from the printer 10 to the PC 60. This wireless profile includes a predetermined SSID “aaaaaa” and a password “pppppp”. Next, the printer 10 executes a connection process with the PC 60 using the wireless profile (S48 in FIG. 3). As a result, a wireless connection is established between the printer 10 and the PC 60 (S48 and S50 in FIG. 3). Thereby, a wireless network including the printer 10 and the PC 60 is constructed.

  If the printer 10 is determined as a client and the PC 60 determines G / O as a result of the G / O negotiation described above (NO in S42 in FIG. 3), the printer 10 changes the status of the printer 10 to the client status. To migrate. On the other hand, the PC 60 shifts the state of the PC 60 to the G / O state. In this case, the printer 10 (that is, the generation unit 40) does not generate a password. The PC 60 generates a password “qqqqqq”. Next, WPS negotiation is executed between the printer 10 and the PC 60 (S52 in FIG. 3), and a wireless profile is transmitted from the PC 60 to the printer 10. This wireless profile includes a predetermined SSID “bbbbbb” and a password “qqqqqq”. Next, the printer 10 executes a connection process with the PC 60 using the wireless profile (S54 in FIG. 3). As a result, a wireless connection is established between the printer 10 and the PC 60 (S54 in FIG. 3). Thereby, a wireless network including the printer 10 and the PC 60 is constructed. Although an example in which the PC 60 newly generates the password “qqqqqq” has been described here, the PC 60 may use a predetermined password without generating a password.

  In Case B, the printer 10 can appropriately perform an operation depending on whether it is determined to operate in the G / O state or the client state, and as a result, the wireless network is appropriately constructed. be able to.

(Correspondence)
The printer 10 is an example of a “wireless communication device”. The G / O state and the client state are examples of the “master station state” and the “slave station state”, respectively. The PC 60 of the case A (FIGS. 6 and 7) is an example of “first external device” and “second external device”. The PC 70 in case A is an example of a “third external device”. The wireless network constructed in the process A1 of the case A and the wireless network constructed in the process A4 are examples of the “first wireless network” and the “second wireless network”, respectively. The password (xxxxxxxx) generated in the process A1 of the case A and the password (yyyyyy) generated in the process A4 are examples of “first authentication information” and “second authentication information”, respectively. The wireless profile including the password “xxxxxxxx” and the wireless profile including the password “yyyyyy” are examples of the “first wireless profile” and the “second wireless profile”, respectively. The PIN / PBC method and the manual method are examples of “automatic wireless setting mode” and “manual wireless setting mode”, respectively. The password “qqqqqq” of case B (FIG. 8) and the wireless profile including the password “qqqqqq” are examples of “specific authentication information” and “specific wireless profile”, respectively.

  Specific examples of the present invention have been described in detail above, but these are merely examples and do not limit the scope of the claims. The technology described in the claims includes various modifications and changes of the specific examples illustrated above. The modifications of the above embodiment are listed below.

(Modification 1) In the above embodiment, the generation unit 42 generates only a password and does not generate an SSID (S22 in FIG. 2, S44 in FIG. 3, and S60 in FIG. 5). Instead of this, the generation unit 42 may generate the SSID together with the password. Further, the generation unit 42 may generate only an SSID without generating a password. Generally speaking, the generation unit may generate not only the first and second authentication information but also other information (for example, SSID).

(Modification 2) In the above embodiment, the generation unit 42 generates a password by converting a randomly generated character string with a predetermined function related to the current time. Instead of this, the generation unit 42 may use a randomly generated character string as a password. The generation unit 42 may generate a password according to a predetermined rule instead of random. Generally speaking, the generation unit may generate second authentication information different from the first authentication information.

(Modification 3) The “wireless communication device” is not limited to the printer 10, and other devices capable of wireless communication (for example, mobile phones, PDAs, PCs, servers, FAX devices, copiers, scanners, multi-function devices, etc.) It may be.

(Modification 4) In the above embodiment, the WFD non-compliant device (PC 70) does not specify whether or not WPS negotiation can be performed. The WFD non-compliant device may be capable of executing WPS negotiation (hereinafter referred to as “WPS compliant device”), or may not be able to execute WPS negotiation (hereinafter referred to as “WPS non-compliant device”). Call). That is, the first to third external devices may be WFD-compatible devices, may be WPS-compatible devices among WFD-incompatible devices, or are not WPS-compatible devices among WFD-incompatible devices. It may be.

(Modification 5) In S62 of FIG. 4 and S80 of FIG. 5, the display control unit 48 may display the SSID and password on the display unit of another device instead of the display unit 12 of the printer 10. That is, generally speaking, the “display unit” may be a display unit inside the wireless communication device or a display unit outside the wireless communication device.

(Modification 6) The “master station state” is not limited to the G / O state of the WFD, but manages other devices configuring the wireless network (for example, managing a list of information on other devices, other devices) It may be in a state of relaying wireless communication between them). The “slave station state” is not limited to the WFD client state, but may be a state managed by a device in the parent station state.

(Modification 7) In each of the embodiments described above, the units 40 to 48 are realized by the CPU 30 of the printer 10 executing processes according to software. Instead, at least a part of each of the units 40 to 48 may be realized by hardware such as a logic circuit.

  The technical elements described in this specification or the drawings exhibit technical usefulness alone or in various combinations, and are not limited to the combinations described in the claims at the time of filing. In addition, the technology illustrated in the present specification or the drawings achieves a plurality of objects at the same time, and has technical utility by achieving one of the objects.

  2: Communication system, 10: Printer, 60: PC, 70: PC

Claims (9)

  1. A wireless communication device capable of selectively operating in any one of a parent station state that functions as a parent station of a wireless network and a non-parent station state that does not function as the parent station of the wireless network,
    A determining unit that determines whether the wireless communication device operates in the master station state or the non-master station state ;
    In a case where a first wireless network including the wireless communication device and a first external device is to be constructed, when it is determined that the wireless communication device operates in the master station state, the first wireless network A generating unit that generates first authentication information included in a first wireless profile for constructing a wireless network;
    Communication execution for establishing the first wireless network by executing communication for establishing a wireless connection with the first external device using the first wireless profile including the first authentication information. And
    With
    A second wireless network including the wireless communication device and a second external device after the first wireless network disappears due to the wireless communication device transitioning from the parent station state to the non-parent station state; In the case where it is to be constructed, when it is determined that the wireless communication device operates in the master station state,
    The generating unit further includes second authentication information included in a second wireless profile for constructing the second wireless network, wherein the second authentication information is different from the first authentication information. Produces
    The communication execution unit further executes communication for establishing a wireless connection with the second external device by using the second wireless profile including the second authentication information, thereby performing the second operation. A wireless communication device that constructs a wireless network.
  2. In the case where the second wireless network is to be constructed, when it is determined that the wireless communication device operates in the non-master station state ,
    The generation unit does not generate the second authentication information,
    The communication execution unit executes communication for establishing a wireless connection with the second external device by using a specific wireless profile including specific authentication information included in the second external device. The wireless communication device according to claim 1, wherein the second wireless network is constructed.
  3. The determination unit
    Determining whether the wireless communication device operates in the parent station state or the non-parent station state when the second wireless network is to be constructed according to an automatic wireless setting mode;
    The wireless communication device according to claim 1 or 2, wherein when the second wireless network is to be constructed according to a manual wireless setting mode, the wireless communication device determines to operate in the master station state.
  4. The non-master station state includes a slave station state that functions as a slave station of the wireless network,
    The wireless communication device
    When the number of external devices operating in the slave station state included in the first wireless network becomes zero, the wireless communication device stops operating in the master station state, and the wireless communication device is 4. The wireless communication apparatus according to claim 1, further comprising a stop unit that shifts from a parent station state to the non-parent station state and extinguishes the first wireless network. 5.
  5.   When the first authentication information is generated, the first authentication information is displayed on the display unit, and when the second authentication information is generated, the second authentication information is displayed on the display unit. The radio | wireless communication apparatus as described in any one of Claim 1 to 4 further provided with the display control part to display.
  6.   The communication execution unit further uses the second wireless profile including the second authentication information when the third external device should newly participate in the second wireless network. The wireless communication device according to any one of claims 1 to 5, wherein communication for establishing a wireless connection with the external device is performed.
  7.   The generation unit randomly generates a first character string, generates the first authentication information using the first character string, and a second character string different from the first character string. 7 is generated at random, and the second authentication information is generated using the second character string.
  8. A wireless communication device capable of selectively operating in any one of a parent station state that functions as a parent station of a wireless network and a non-parent station state that does not function as the parent station of the wireless network,
    In the above case should first wireless network including a radio communication apparatus and the first external device is built, the in case that the wireless communication device is to operate in the master station status, including the first authentication information Using the first wireless profile, the communication execution unit for constructing the first wireless network by executing communication for establishing a wireless connection with the first external device,
    The communication execution unit further includes the wireless communication device and the second external device after the first wireless network disappears due to the wireless communication device shifting from the parent station state to the non-parent station state. in the case to the second wireless network is constructed including the in case that the wireless communication device is to operate in the master station status, including the different second authentication information from the first authentication information A wireless communication device that constructs the second wireless network by executing communication for establishing a wireless connection with the second external device using the wireless profile of 2.
  9. A computer for a wireless communication apparatus that can selectively operate in any one of a parent station state that functions as a parent station of a wireless network and a non-parent station state that does not function as the parent station of the wireless network A program,
    In the computer mounted on the wireless communication device, the following processes, that is,
    A determination process for determining whether the wireless communication device operates in the master station state or the non-master station state ;
    In a case where a first wireless network including the wireless communication device and a first external device is to be constructed, when it is determined that the wireless communication device operates in the master station state, the first wireless network Generation processing for generating first authentication information included in a first wireless profile for constructing a wireless network;
    Communication execution for establishing the first wireless network by executing communication for establishing a wireless connection with the first external device using the first wireless profile including the first authentication information. Processing,
    And execute
    A second wireless network including the wireless communication device and a second external device after the first wireless network disappears due to the wireless communication device transitioning from the parent station state to the non-parent station state; In the case where it is to be constructed, when it is determined that the wireless communication device operates in the master station state,
    In the generation process, the second authentication information, which is second authentication information included in a second wireless profile for constructing the second wireless network and is different from the first authentication information. Produces
    In the communication execution process, further, the second wireless profile including the second authentication information is used to execute communication for establishing a wireless connection with the second external device. A computer program that builds a wireless network.
JP2011132285A 2011-06-14 2011-06-14 wireless communication device Active JP5754255B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2011132285A JP5754255B2 (en) 2011-06-14 2011-06-14 wireless communication device

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
JP2011132285A JP5754255B2 (en) 2011-06-14 2011-06-14 wireless communication device
EP18199688.5A EP3451724A1 (en) 2011-06-14 2012-03-21 Wireless communication device
EP12160618.0A EP2536245B1 (en) 2011-06-14 2012-03-21 Wireless communication device
CN201210082577.2A CN102833751B (en) 2011-06-14 2012-03-26 Wireless communication device
US13/429,613 US8693038B2 (en) 2011-06-14 2012-03-26 Wireless communication device capable of operating selectively in any state among a plurality of states including a parent state and a child state in a wireless network
US14/184,467 US20140169219A1 (en) 2011-06-14 2014-02-19 Wireless communication device capable of operating selectively in any state among a plurality of states including a parent state and a child state in a wireless network

Publications (2)

Publication Number Publication Date
JP2013005095A JP2013005095A (en) 2013-01-07
JP5754255B2 true JP5754255B2 (en) 2015-07-29

Family

ID=45855570

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2011132285A Active JP5754255B2 (en) 2011-06-14 2011-06-14 wireless communication device

Country Status (4)

Country Link
US (2) US8693038B2 (en)
EP (2) EP2536245B1 (en)
JP (1) JP5754255B2 (en)
CN (1) CN102833751B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5950691B2 (en) * 2012-02-09 2016-07-13 シャープ株式会社 Information processing system, information processing apparatus, and communication connection method
KR20140011969A (en) * 2012-07-19 2014-01-29 삼성전자주식회사 Wireless communication system and method for offline participation in a display session
JP6172954B2 (en) * 2013-01-25 2017-08-02 キヤノン株式会社 Communication device, communication device control method, program
JP6418723B2 (en) 2013-02-15 2018-11-07 キヤノン株式会社 Communication device, communication device control method, and program
JP6238528B2 (en) * 2013-02-22 2017-11-29 キヤノン株式会社 Printing device
CN104010384A (en) * 2013-02-27 2014-08-27 腾讯科技(深圳)有限公司 Device searching method and apparatus
JP6118187B2 (en) * 2013-06-12 2017-04-19 キヤノン株式会社 Printing apparatus, printing apparatus control method, and program
EP3050271A1 (en) * 2013-09-27 2016-08-03 Arçelik Anonim Sirketi Connecting a household appliance to wlan using a temporary network
US10019703B2 (en) 2014-05-13 2018-07-10 Google Llc Verifying a secure connection between a network beacon and a user computing device
US9485243B2 (en) * 2014-05-23 2016-11-01 Google Inc. Securing a wireless mesh network via a chain of trust
JP6370144B2 (en) * 2014-07-25 2018-08-08 キヤノン株式会社 Printing apparatus, method and program for executing NFC touch printing
CN104580401A (en) * 2014-12-23 2015-04-29 小米科技有限责任公司 Connecting method and device
US10205776B2 (en) * 2014-12-23 2019-02-12 Xiaomi Inc. Method and device for wireless connection
JP6166746B2 (en) 2015-04-10 2017-07-19 キヤノン株式会社 Communication device, its control method, and program
CN106162933A (en) * 2015-04-15 2016-11-23 小米科技有限责任公司 Terminal room method of mobile communication and device
CN104936258A (en) * 2015-06-17 2015-09-23 青岛海信移动通信技术股份有限公司 Network access method, terminal and system
US10009944B2 (en) * 2015-08-26 2018-06-26 International Business Machines Corporation Controlling wireless connection of a device to a wireless access point
EP3144798A1 (en) * 2015-09-18 2017-03-22 Canon Kabushiki Kaisha Image processing apparatus, method of controlling the same, and storage medium
CN107682911A (en) * 2017-10-13 2018-02-09 歌尔科技有限公司 Wireless network connecting method, device, equipment and system

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001175602A (en) 1999-12-20 2001-06-29 Casio Comput Co Ltd Method for establishing communication terminal connection and communication system
JP2004234286A (en) 2003-01-30 2004-08-19 Toshiba Corp Information processor and communication data setting control method
JP4489601B2 (en) 2005-01-07 2010-06-23 株式会社日立製作所 Security information exchange method, recorder apparatus, and television receiver
JP4502393B2 (en) * 2005-06-13 2010-07-14 キヤノン株式会社 Communication parameter sharing method and communication apparatus
JP4829600B2 (en) * 2005-11-28 2011-12-07 キヤノン株式会社 Communication device and communication device control method
KR101085905B1 (en) * 2007-03-13 2011-11-23 삼성전자주식회사 Wireless network printing system
CN101771586B (en) * 2008-11-14 2013-10-09 华为终端有限公司 Method, system and equipment for realizing equipment adding in wireless fidelity (Wi-Fi) point-to-point network
JP5319375B2 (en) * 2009-04-14 2013-10-16 オリンパス株式会社 Wireless communication terminal and wireless network connection setting method
JP4700122B2 (en) * 2009-05-29 2011-06-15 株式会社バッファロー Wireless LAN device
US8873523B2 (en) * 2009-09-30 2014-10-28 Apple Inc. Methods and apparatus for solicited activation for protected wireless networking
US8335937B2 (en) * 2009-12-24 2012-12-18 Intel Corporation Method and system for discoverability of power saving P2P devices
US8493992B2 (en) * 2010-02-04 2013-07-23 Texas Instruments Incorporated Interrelated WiFi and USB protocols and other application framework processes, circuits and systems
JP5772105B2 (en) * 2011-03-17 2015-09-02 株式会社リコー Wireless communication apparatus, wireless communication method, and program
US9167612B2 (en) * 2011-04-07 2015-10-20 Hewlett-Packard Development Company, L.P. Minimal synchronized network operations

Also Published As

Publication number Publication date
US20140169219A1 (en) 2014-06-19
JP2013005095A (en) 2013-01-07
EP2536245B1 (en) 2018-12-05
US8693038B2 (en) 2014-04-08
EP2536245A2 (en) 2012-12-19
CN102833751A (en) 2012-12-19
EP2536245A3 (en) 2014-05-21
EP3451724A1 (en) 2019-03-06
CN102833751B (en) 2015-07-08
US20120322391A1 (en) 2012-12-20

Similar Documents

Publication Publication Date Title
US9973914B2 (en) Communication device
US9826116B2 (en) Image forming apparatus supporting peer to peer connection and method of performing image forming operation thereof
JP6019675B2 (en) Function execution device
US7986642B2 (en) Wireless network system, and wireless device included in the system
EP2565779B1 (en) Image forming apparatus supporting peer-to-peer connection and method of managing address book thereof
US20190215908A1 (en) Communication Device
US20090271709A1 (en) Method and apparatus for setting up wireless lan of device
US10375750B2 (en) Communication device
US8774144B2 (en) Wireless communication device
KR20130079839A (en) Method for wi-fi direct connection
US9907016B2 (en) Communication device
US9042940B2 (en) Technique for executing communication of object data with mobile device
JP6123416B2 (en) Communication device
US9712954B2 (en) Communication device and non-transitory computer-readable recording medium
JP2013214807A (en) Image output device, communication device program and information management device
JP5954024B2 (en) Communication device
CN103327644B (en) A method and apparatus for the wireless connection
US9794108B2 (en) Communication apparatus, methods, and non-transitory computer-readable media for determining IP addresses for use in different networks
US9614856B2 (en) Image forming apparatus supporting peer-to-peer connection and access point operation and method of controlling peer-to-peer connection and access point operation thereof
US20130057897A1 (en) Image forming apparatus supporting peer-to-peer connection and method of forming images by authenticating user thereof
US10142014B2 (en) Multi-function device and terminal device
KR101630505B1 (en) Method and apparatus for sharing connectivity settings via social networks
EP2950560A1 (en) Function execution device and communication terminal
EP2713639A1 (en) Image Forming Apparatus to Support Wi-Fi Direct and Method of Wi-Fi Direct Connecting Therein
EP2536182B1 (en) Apparatuses for establishing a peer-to-peer wireless network

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20140313

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20141114

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20150210

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20150410

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20150428

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20150511

R150 Certificate of patent or registration of utility model

Ref document number: 5754255

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150